Search dblp for Publications

export results for "toc:db/conf/sp/spw2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AgrafiotisEHGC16,
  author       = {Ioannis Agrafiotis and
                  Arnau Erola and
                  Jassim Happa and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Validating an Insider Threat Detection System: {A} Real Scenario Perspective},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {286--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.36},
  doi          = {10.1109/SPW.2016.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AgrafiotisEHGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AldousM16,
  author       = {Peter Aldous and
                  Matthew Might},
  title        = {A Posteriori Taint-Tracking for Demonstrating Non-interference in
                  Expressive Low-Level Languages},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {179--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.58},
  doi          = {10.1109/SPW.2016.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AldousM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AliPS16,
  author       = {Zaire Ali and
                  Jamie Payton and
                  Vincent Sritapan},
  title        = {At Your Fingertips: Considering Finger Distinctness in Continuous
                  Touch-Based Authentication for Mobile Devices},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {272--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.29},
  doi          = {10.1109/SPW.2016.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AliPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlshanketiTA16,
  author       = {Faisal Alshanketi and
                  Issa Traor{\'{e}} and
                  Ahmed Awad E. Ahmed},
  title        = {Improving Performance and Usability in Mobile Keystroke Dynamic Biometric
                  Authentication},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {66--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.12},
  doi          = {10.1109/SPW.2016.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlshanketiTA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AndowNBEX16,
  author       = {Benjamin Andow and
                  Adwait Nadkarni and
                  Blake Bassett and
                  William Enck and
                  Tao Xie},
  title        = {A Study of Grayware on Google Play},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {224--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.40},
  doi          = {10.1109/SPW.2016.40},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AndowNBEX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AzabE16,
  author       = {Mohamed Azab and
                  Mohamed Eltoweissy},
  title        = {{MIGRATE:} Towards a Lightweight Moving-Target Defense Against Cloud
                  Side-Channels},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {96--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.28},
  doi          = {10.1109/SPW.2016.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AzabE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Bar-SinaiSC16,
  author       = {Michael Bar{-}Sinai and
                  Latanya Sweeney and
                  Merc{\`{e}} Crosas},
  title        = {DataTags, Data Handling Policy Spaces and the Tags Language},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.11},
  doi          = {10.1109/SPW.2016.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Bar-SinaiSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Bottinger16,
  author       = {Konstantin B{\"{o}}ttinger},
  title        = {Hunting Bugs with L{\'{e}}vy Flight Foraging},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {111--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.9},
  doi          = {10.1109/SPW.2016.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Bottinger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Brennan-Marquez16,
  author       = {Kiel Brennan{-}Marquez and
                  Daniel Susser},
  title        = {Obstacles to Transparency in Privacy Engineering},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {49--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.18},
  doi          = {10.1109/SPW.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Brennan-Marquez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrownAD16,
  author       = {James Brown and
                  Mohd Anwar and
                  Gerry V. Dozier},
  title        = {Detection of Mobile Malware: An Artificial Immunity Approach},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {74--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.32},
  doi          = {10.1109/SPW.2016.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BrownAD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BuriroCFW16,
  author       = {Attaullah Buriro and
                  Bruno Crispo and
                  Filippo Del Frari and
                  Konrad S. Wrona},
  title        = {Hold and Sign: {A} Novel Behavioral Biometrics for Smartphone User
                  Authentication},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {276--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.20},
  doi          = {10.1109/SPW.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BuriroCFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenPG16,
  author       = {Chien{-}Lun Chen and
                  Ranjan Pal and
                  Leana Golubchik},
  title        = {Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures,
                  and Open Questions},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.27},
  doi          = {10.1109/SPW.2016.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChengC16,
  author       = {Shin{-}Ming Cheng and
                  Pin{-}Yu Chen},
  title        = {Ecology-Based DoS Attack in Cognitive Radio Networks},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {104--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.10},
  doi          = {10.1109/SPW.2016.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChengC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ColeskyHH16,
  author       = {Michael Colesky and
                  Jaap{-}Henk Hoepman and
                  Christiaan Hillen},
  title        = {A Critical Analysis of Privacy Design Strategies},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.23},
  doi          = {10.1109/SPW.2016.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ColeskyHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CoposLBR16,
  author       = {Bogdan Copos and
                  Karl N. Levitt and
                  Matt Bishop and
                  Jeff Rowe},
  title        = {Is Anybody Home? Inferring Activity From Smart Home Network Traffic},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {245--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.48},
  doi          = {10.1109/SPW.2016.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CoposLBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CostanteFEHZ16,
  author       = {Elisa Costante and
                  Davide Fauri and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {A Hybrid Framework for Data Loss Prevention and Detection},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {324--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.24},
  doi          = {10.1109/SPW.2016.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CostanteFEHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CurleyH16,
  author       = {Sheridan S. Curley and
                  Richard E. Harang},
  title        = {Grammatical Inference and Machine Learning Approaches to Post-Hoc
                  LangSec},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {171--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.26},
  doi          = {10.1109/SPW.2016.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CurleyH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DabrowskiMKW16,
  author       = {Adrian Dabrowski and
                  Georg Merzdovnik and
                  Nikolaus Kommenda and
                  Edgar R. Weippl},
  title        = {Browser History Stealing with Captive Wi-Fi Portals},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {234--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.42},
  doi          = {10.1109/SPW.2016.42},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DabrowskiMKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DashSKTAKC16,
  author       = {Santanu Kumar Dash and
                  Guillermo Suarez{-}Tangil and
                  Salahuddin J. Khan and
                  Kimberly Tam and
                  Mansour Ahmadi and
                  Johannes Kinder and
                  Lorenzo Cavallaro},
  title        = {DroidScribe: Classifying Android Malware Based on Runtime Behavior},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {252--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.25},
  doi          = {10.1109/SPW.2016.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DashSKTAKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DeM16,
  author       = {Sourya Joyee De and
                  Daniel Le M{\'{e}}tayer},
  title        = {Privacy Harm Analysis: {A} Case Study on Smart Grids},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.21},
  doi          = {10.1109/SPW.2016.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DeM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DrewMH16,
  author       = {Jake Drew and
                  Tyler Moore and
                  Michael Hahsler},
  title        = {Polymorphic Malware Detection Using Sequence Classification Methods},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {81--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.30},
  doi          = {10.1109/SPW.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DrewMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EdwardsMD16,
  author       = {Lilian Edwards and
                  Derek McAuley and
                  Laurence Diver},
  title        = {From Privacy Impact Assessment to Social Impact Assessment},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {53--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.19},
  doi          = {10.1109/SPW.2016.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/EdwardsMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EndignouxLM16,
  author       = {Guillaume Endignoux and
                  Olivier Levillain and
                  Jean{-}Yves Migeon},
  title        = {Caradoc: {A} Pragmatic Approach to {PDF} Parsing and Validation},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {126--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.39},
  doi          = {10.1109/SPW.2016.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/EndignouxLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FatemaDLOMM16,
  author       = {Kaniz Fatema and
                  Christophe Debruyne and
                  Dave Lewis and
                  Declan O'Sullivan and
                  John P. Morrison and
                  Abdullah{-}Al Mazed},
  title        = {A Semi-Automated Methodology for Extracting Access Control Rules from
                  the European Data Protection Directive},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.16},
  doi          = {10.1109/SPW.2016.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FatemaDLOMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Filardo16,
  author       = {Nathaniel Wesley Filardo},
  title        = {Research Report: Mitigating LangSec Problems with Capabilities},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {189--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.57},
  doi          = {10.1109/SPW.2016.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Filardo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KammullerK16,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber},
  title        = {Investigating Airplane Safety and Security Against Insider Threats
                  Using Logical Modeling},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {304--313},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.47},
  doi          = {10.1109/SPW.2016.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KammullerK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KelbertF16,
  author       = {Florian Kelbert and
                  Alexander Fromm},
  title        = {Compliance Monitoring of Third-Party Applications in Online Social
                  Networks},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.13},
  doi          = {10.1109/SPW.2016.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KelbertF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Lampesberger16,
  author       = {Harald Lampesberger},
  title        = {An Incremental Learner for Language-Based Anomaly Detection in {XML}},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {156--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.35},
  doi          = {10.1109/SPW.2016.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Lampesberger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LinP16,
  author       = {Alan C. Lin and
                  Gilbert L. Peterson},
  title        = {Activity Pattern Discovery from Network Captures},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {334--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.22},
  doi          = {10.1109/SPW.2016.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LinP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McGeer16,
  author       = {Rick McGeer},
  title        = {Declarative Verifiable {SDI} Specifications},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {198--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.49},
  doi          = {10.1109/SPW.2016.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/McGeer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MutchlerSDM16,
  author       = {Patrick Mutchler and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  John C. Mitchell},
  title        = {Target Fragmentation in Android Apps},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {204--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.31},
  doi          = {10.1109/SPW.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MutchlerSDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OehmenBMPSJNTP16,
  author       = {Christopher S. Oehmen and
                  Paul J. Bruillard and
                  Brett D. Matzke and
                  Aaron R. Phillips and
                  Keith T. Star and
                  Jeffrey L. Jensen and
                  Doug Nordwall and
                  Seth R. Thompson and
                  Elena S. Peterson},
  title        = {{LINEBACKER:} LINE-Speed Bio-Inspired Analysis and Characterization
                  for Event Recognition},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {88--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.44},
  doi          = {10.1109/SPW.2016.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OehmenBMPSJNTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OehmenPPC16,
  author       = {Christopher S. Oehmen and
                  Elena S. Peterson and
                  Aaron R. Phillips and
                  Darren S. Curtis},
  title        = {A Biosequence-Based Approach to Software Characterization},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.43},
  doi          = {10.1109/SPW.2016.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OehmenPPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RobertsHNYMS16,
  author       = {Shannon C. Roberts and
                  John T. Holodnak and
                  Trang Nguyen and
                  Sophia Yuditskaya and
                  Maja Milosavljevic and
                  William W. Streilein},
  title        = {A Model-Based Approach to Predicting the Performance of Insider Threat
                  Detection Systems},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {314--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.14},
  doi          = {10.1109/SPW.2016.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RobertsHNYMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchiffS16,
  author       = {Liron Schiff and
                  Stefan Schmid},
  title        = {{PRI:} Privacy Preserving Inspection of Encrypted Network Traffic},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {296--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.34},
  doi          = {10.1109/SPW.2016.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SchiffS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Shapiro16,
  author       = {Stuart S. Shapiro},
  title        = {Privacy Risk Analysis Based on System Control Structures: Adapting
                  System-Theoretic Process Analysis for Privacy Engineering},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.15},
  doi          = {10.1109/SPW.2016.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Shapiro16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TianYRT16,
  author       = {Ke Tian and
                  Danfeng Yao and
                  Barbara G. Ryder and
                  Gang Tan},
  title        = {Analysis of Code Heterogeneity for High-Precision Classification of
                  Repackaged Malware},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {262--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.33},
  doi          = {10.1109/SPW.2016.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TianYRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TorreyM16,
  author       = {Jacob I. Torrey and
                  Jonathan Miodownik},
  title        = {Research Report: Analysis of Software for Restricted Computational
                  Environment Applicability},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {185--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.38},
  doi          = {10.1109/SPW.2016.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TorreyM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TrewinSKS16,
  author       = {Shari Trewin and
                  Calvin Swart and
                  Larry Koved and
                  Kapil Singh},
  title        = {Perceptions of Risk in Mobile Transaction},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {214--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.37},
  doi          = {10.1109/SPW.2016.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TrewinSKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/UnderwoodL16,
  author       = {Katherine Underwood and
                  Michael E. Locasto},
  title        = {In Search of Shotgun Parsers in Android Applications},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {140--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.41},
  doi          = {10.1109/SPW.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/UnderwoodL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Yue16,
  author       = {Chuan Yue},
  title        = {Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference
                  Attacks},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {241--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.17},
  doi          = {10.1109/SPW.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Yue16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2016w,
  title        = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7517741/proceeding},
  isbn         = {978-1-5090-3690-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics